Mohammad A. AL-Fayoumi
Department of Computer Information Science, Faculty of IT,
The Middle East University for Graduate Studies, Amman, Jordan
Sattar J. Aboud
Department of Computer Information Science, Faculty of IT,
The Middle East University for Graduate Studies, Amman, Jordan
ABSTRACT
Identity authentication and key agreement schemes play significant role in ad hoc networks. In this study, a new identity authentication scheme relies on the threshold group signature is introduced. Compared with the current schemes it is secure, efficient and adaptable to a multi-hop feature of ad hoc networks. In addition, a new key agreement scheme based on the threshold cryptography using the Lagrange interpolation theorem is suggested, its efficiency and security are examined and is claimed to be more efficient than the existing schemes.
PDF References Citation
How to cite this article
Mohammad A. AL-Fayoumi and Sattar J. Aboud, 2007. Identity Authentication and Key Agreement Schemes for Ad Hoc Networks. Journal of Applied Sciences, 7: 1638-1642.
DOI: 10.3923/jas.2007.1638.1642
URL: https://scialert.net/abstract/?doi=jas.2007.1638.1642
DOI: 10.3923/jas.2007.1638.1642
URL: https://scialert.net/abstract/?doi=jas.2007.1638.1642
REFERENCES
- Bettstetter, C. and B. Friedrich, 2003. Time and message complexities of the generalized distributed mobility adaptive clustering (GDMAC) algorithm in wireless multihop network. Proceedings of the 57th Semiannual Vehicular Technology Conference, April 22-25, 2003, Jeju, Korea, pp: 176-180.
CrossRef - Hezberg, H., D. Jarecki, H. Krawzyk and M. Young, 1995. Proactive secret sharing or: How to cope with perpetual leakage. Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, August 27-31, 1995, Springer Verlag, London, pp: 339-352.
Direct Link - Lang, W., M. Zhou and K. She, 2003. Key agreement protocol in ad hoc network. Proceedings of the International Conference on Communication Technology, April 9-11, 2003, IEEE Xplore, pp: 296-301.
CrossRef - Luo, H., P. Zerfos, J. Kong, S. Lu and L. Zhong, 2002. Self securing ad hoc wireless networks. Proceedings of the 7th Symposium on Computers and Communications, July 1-4, 2002, Italy, pp: 567-574.
CrossRef - Mauve, M., J. Widmer and H. Hartenstein, 2001. A survey on position-based routing in mobile ad hoc networks. IEEE Netw., 15: 30-39.
CrossRefDirect Link - Pieprzyk, J. and C. Li, 2000. Multiparty key agreement protocols. IEE Proc. Comput. Digital Techniques, 147: 229-236.
Direct Link - Stjmenovic, I. and X. Lin, 2001. Power aware localized routing in wireless networks. IEEE Trans. Parallel Distrib. Syst., 12: 1122-1133.
Direct Link